Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning Android
Learning Android

This book sprang from years of delivering the Marakana Android Bootcamp training class to thousands of software developers at some of the largest mobile companies located on four continents around the world. Teaching this class, over time I saw what works and what doesn’t. This book is a distilled version of the Android Bootcamp...

Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software
Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software

In the early days, embedded systems were built primarily by engineers in a pretty exclusive club. Embedded devices and software tools were expensive, and building a functional prototype required significant software engineering and electrical engineering experience.

With the arrival of Arduino, the open source electronics...

Information Optics and Photonics: Algorithms, Systems, and Applications
Information Optics and Photonics: Algorithms, Systems, and Applications

This book will address the advances, applications, research results, and emerging areas of optics, photonics, computational approaches, nano-photonics, bio-photonics, with applications in information systems. The objectives are to bring together novel approaches, analysis, models, and technologies that enhance sensing, measurement,...

Practical Goal Programming (International Series in Operations Research & Management Science)
Practical Goal Programming (International Series in Operations Research & Management Science)

The setting and attainment of goals is a fundamental aspect of human decision making, which is manifest in the modern discipline of operational research by the technique of goal programming. Influences from the fields of mathematical programming and multiple criteria decision making (MCDM) can be found in goal programming, and it is...

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

Image and Video Processing in the Compressed Domain
Image and Video Processing in the Compressed Domain

With more and more images and videos being available in the compressed format, researchers have started taking interest in the aspect of designing algorithms for different image operations directly in their domains of representation. This would not only avoid the inverse and forward transformation steps and potentially make the...

Statistical Data Mining Using SAS Applications, Second Edition
Statistical Data Mining Using SAS Applications, Second Edition

The objective of the second edition of this book is to introduce statistical data mining concepts, describe methods in statistical data mining from sampling to decision trees, demonstrate the features of user-friendly data mining SAS tools and, above all, allow the book users to download compiled data mining SAS (Version 9.0 and...

Bootstrap Yourself with Linux-USB Stack: Design, Develop, Debug, and Validate Embedded USB Systems
Bootstrap Yourself with Linux-USB Stack: Design, Develop, Debug, and Validate Embedded USB Systems

Before starting a new task, you generally do research so you can avoid mistakes. In the computer realm, bootstrap sessions provide a head start and help you minimize mistakes and surprises. As an example, to design a protocol stack, build a bootstrap session so you can understand the protocol specification and the system on which it...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

The Handbook of Computational Linguistics and Natural Language Processing
The Handbook of Computational Linguistics and Natural Language Processing

We started work on this handbook three years ago and, while bringing it to fruition has involved a great deal of work, we have enjoyed the process. We are grateful to our colleagues who have contributed chapters to the volume. Its quality is due to their labor and commitment. We appreciate the considerable time and effort that they...

Fast Fourier Transform - Algorithms and Applications (Signals and Communication Technology)
Fast Fourier Transform - Algorithms and Applications (Signals and Communication Technology)

This book presents an introduction to the principles of the fast Fourier transform (FFT). It covers FFTs, frequency domain filtering, and applications to video and audio signal processing.

As fields like communications, speech and image processing, and related areas are rapidly developing, the FFT as one of the essential...

Error Correction Codes for Non-Volatile Memories
Error Correction Codes for Non-Volatile Memories

Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio CD's and we watch movies via encoded DVD's. There is at least one area where the use of encoding/decoding is not so developed, yet: Flash non-volatile memories. Flash memory high-density, low power, cost...

Result Page: 1849 1848 1847 1846 1845 1844 1843 1842 1841 1840 1839 1838 1837 1836 1835 1834 1833 1832 1831 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy